1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
7

How would you build a robot

Computers and Technology
2 answers:
nignag [31]3 years ago
7 0

Answer:

Use electric cables and build it with good strong metal

Explanation:

katen-ka-za [31]3 years ago
3 0

Answer:

use a lot of tech to assemble the robot

Explanation:

You might be interested in
Which of the follow is an example of an integer?<br> "1.091"<br> "number"<br> 15<br> name
UkoKoshka [18]

Answer:

The answer is 15

Explanation:

A integer is a whole number, the only wholenumber present is 15

Hope this helps :)

8 0
2 years ago
In which type of network can a computer upload and download data at the same time?
REY [17]

answer is peer-to-peer


hope this helps

8 0
3 years ago
Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, da
PolarNik [594]

Answer:

Following are the solution to the given terms:

Explanation:

Data Model: A set of concepts that are ideal for describing the layout, computational tools, relations, semantics, constraints on accuracy.

Database Scheme: It is also known as the overall design of the database.

Database State: It is the data in the database at a particular moment in time.

Internal Schema: The physical structure of the database is defined.

Conceptual Schema: It hides the details of physical storage.

External Schema: It describes the part of the database the user group sees. In other words, we can say that it is a view of the database.

Data Independence: The ability to modify the schema at a single level while modifying the schema at a higher level is often recognized.

DDL: It stands for the Data Definition Language, which is used by DBA and dev use for creating With particular scheme.  

DML: It refers to the Data Manipulation Language, which is used to manipulate, add, recover, insert, remove, and alter data.  

SDL: It stands for the storage definition language, in which the internal schema of the database is applied for storage description.  

VDL: The view definition language specifies the user to view and mapping their conceptual schema.

Query Language: It is just an independent, dynamic, high-level dialect used during manipulation.  

Host Language: It is also the machine language, that would be incorporated into the general programming language by low-level data handling commands.  

Data sublanguage: It uses for embedding in the last language.  

Database Utility: It is a program, which helps to handle the database with DBA's modules.  

Catalog: The entire structure and constraints of the database is defined.

client/server architecture: The design of the database server system that device usability: model user, model server (landless storage) software Government computer design in which many users (remote processors) demand a central server to receive service (host computer).  

Three-tier architecture: It is the application, data, user interface.

n-tier architecture: multiple levels. The nth level must only be able to handle the n+1 application and transmit it to the n-1 point.

3 0
3 years ago
Help me with ic3!!!!!!!
Scilla [17]

1. Locally 2. Codec 3. Analog, Digital 4. ISP 5.

4 0
3 years ago
The cost of a given amount of computing power has _____.
lana [24]

Answer:

decreased drastically over the last five decades

Explanation:

I would say it is that answer because a few decades ago we needed huuuge computers that filled rooms to compute simple tasks. Now we have cellphones, which are basically computers that can fit into the palm of our hands. Our phones can do more than what those huge computers of the past did and they're easier to produce. So cost must have drastically decreased.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What did Bill Gates invent?
    11·2 answers
  • Why does people that gets abused not report?
    5·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • When it's time to change career paths, it's a good idea to first​
    7·2 answers
  • If you could own a large technology Company, which one would it be and why
    9·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • What are hardware and software?<br><br><br><br> WILL MARK BRAINIEST
    9·2 answers
  • Would it be possible to make VR technology in a way that our brain sees imagined experiences using simple impulses (like words)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!